diff options
author | James Housley <jim@thehousleys.net> | 2007-06-12 12:31:10 +0000 |
---|---|---|
committer | James Housley <jim@thehousleys.net> | 2007-06-12 12:31:10 +0000 |
commit | 99e0597c7b74a8be4c85819554b7a1eb447f5ed5 (patch) | |
tree | db63ef2f18e46ba4bcc92eef0f8c310154369433 | |
parent | 3247ac191819a072777ac7277e0ef8a5cd21fd2f (diff) |
Convert Curl_ssh_connect() to run in a state machine for
LIBSSH2_APINO >= 200706012030. More to come...
-rw-r--r-- | lib/ssh.c | 643 | ||||
-rw-r--r-- | lib/ssh.h | 1 | ||||
-rw-r--r-- | lib/urldata.h | 35 |
3 files changed, 591 insertions, 88 deletions
@@ -234,6 +234,522 @@ static LIBSSH2_FREE_FUNC(libssh2_free) (void)abstract; } +/* + * SSH State machine related code + */ +/* This is the ONLY way to change SSH state! */ +static void state(struct connectdata *conn, ftpstate state) +{ +#if defined(CURLDEBUG) && !defined(CURL_DISABLE_VERBOSE_STRINGS) + /* for debug purposes */ + const char *names[]={ + "STOP", + "SSH_S_STARTUP", + "SSH_AUTHLIST", + "SSH_AUTH_PKEY_INIT", + "SSH_AUTH_PKEY", + "SSH_AUTH_PASS_INIT", + "SSH_AUTH_PASS", + "SSH_AUTH_HOST_INIT", + "SSH_AUTH_HOST", + "SSH_AUTH_KEY_INIT", + "SSH_AUTH_KEY", + "SSH_AUTH_DONE", + "SSH_SFTP_INIT", + "SSH_SFTP_REALPATH", + "SSH_GET_WORKINGPATH", + "QUIT" + }; +#endif + struct ssh_conn *sshc = &conn->proto.sshc; + +#if defined(CURLDEBUG) && !defined(CURL_DISABLE_VERBOSE_STRINGS) + if (sshc->state != state) { + infof(conn->data, "FTP %p state change from %s to %s\n", + sshc, names[sshc->state], names[state]); + } +#endif + + sshc->state = state; +} + +static CURLcode ssh_statemach_act(struct connectdata *conn) +{ + CURLcode result = CURLE_OK; + struct SessionHandle *data=conn->data; + struct ssh_conn *sshc = &conn->proto.sshc; + curl_socket_t sock = conn->sock[FIRSTSOCKET]; + struct SSHPROTO *ssh; +#ifdef CURL_LIBSSH2_DEBUG + const char *fingerprint; +#endif /* CURL_LIBSSH2_DEBUG */ + int rc; + + ssh = data->reqdata.proto.ssh; + + switch(sshc->state) { + case SSH_S_STARTUP: + rc = libssh2_session_startup(ssh->ssh_session, sock); + if (rc == LIBSSH2_ERROR_EAGAIN) { + break; + } + else if (rc) { + failf(data, "Failure establishing ssh session"); + libssh2_session_free(ssh->ssh_session); + ssh->ssh_session = NULL; + state(conn, SSH_STOP); + result = CURLE_FAILED_INIT; + break; + } + +#ifdef CURL_LIBSSH2_DEBUG + /* + * Before we authenticate we should check the hostkey's fingerprint + * against our known hosts. How that is handled (reading from file, + * whatever) is up to us. As for know not much is implemented, besides + * showing how to get the fingerprint. + */ + fingerprint = libssh2_hostkey_hash(ssh->ssh_session, + LIBSSH2_HOSTKEY_HASH_MD5); + + /* The fingerprint points to static storage (!), don't free() it. */ + infof(data, "Fingerprint: "); + for (i = 0; i < 16; i++) { + infof(data, "%02X ", (unsigned char) fingerprint[i]); + } + infof(data, "\n"); +#endif /* CURL_LIBSSH2_DEBUG */ + + state(conn, SSH_AUTHLIST); + break; + + case SSH_AUTHLIST: + /* TBD - methods to check the host keys need to be done */ + + /* + * Figure out authentication methods + * NB: As soon as we have provided a username to an openssh server we + * must never change it later. Thus, always specify the correct username + * here, even though the libssh2 docs kind of indicate that it should be + * possible to get a 'generic' list (not user-specific) of authentication + * methods, presumably with a blank username. That won't work in my + * experience. + * So always specify it here. + */ + sshc->authlist = libssh2_userauth_list(ssh->ssh_session, ssh->user, + strlen(ssh->user)); + + if (!sshc->authlist) { + if (libssh2_session_last_errno(ssh->ssh_session) == + LIBSSH2_ERROR_EAGAIN) { + break; + } else { + libssh2_session_free(ssh->ssh_session); + ssh->ssh_session = NULL; + state(conn, SSH_STOP); + result = CURLE_OUT_OF_MEMORY; + break; + } + } + infof(data, "SSH authentication methods available: %s\n", sshc->authlist); + + state(conn, SSH_AUTH_PKEY_INIT); + break; + + case SSH_AUTH_PKEY_INIT: + /* + * Check the supported auth types in the order I feel is most secure with + * the requested type of authentication + */ + sshc->authed = FALSE; + + if ((data->set.ssh_auth_types & CURLSSH_AUTH_PUBLICKEY) && + (strstr(sshc->authlist, "publickey") != NULL)) { + char *home; + + sshc->rsa_pub[0] = sshc->rsa[0] = '\0'; + + /* To ponder about: should really the lib be messing about with the + HOME environment variable etc? */ + home = curl_getenv("HOME"); + + if (data->set.ssh_public_key) + snprintf(sshc->rsa_pub, sizeof(sshc->rsa_pub), "%s", + data->set.ssh_public_key); + else if (home) + snprintf(sshc->rsa_pub, sizeof(sshc->rsa_pub), "%s/.ssh/id_dsa.pub", + home); + + if (data->set.ssh_private_key) + snprintf(sshc->rsa, sizeof(sshc->rsa), "%s", + data->set.ssh_private_key); + else if (home) + snprintf(sshc->rsa, sizeof(sshc->rsa), "%s/.ssh/id_dsa", home); + + sshc->passphrase = data->set.key_passwd; + if (!sshc->passphrase) + sshc->passphrase = ""; + + curl_free(home); + + infof(conn->data, "Using ssh public key file %s\n", sshc->rsa_pub); + infof(conn->data, "Using ssh private key file %s\n", sshc->rsa); + + if (sshc->rsa_pub[0]) { + state(conn, SSH_AUTH_PKEY); + } else { + state(conn, SSH_AUTH_PASS_INIT); + } + } else { + state(conn, SSH_AUTH_PASS_INIT); + } + break; + + case SSH_AUTH_PKEY: + /* The function below checks if the files exists, no need to stat() here. + */ + rc = libssh2_userauth_publickey_fromfile(ssh->ssh_session, ssh->user, + sshc->rsa_pub, sshc->rsa, + sshc->passphrase); + if (rc == LIBSSH2_ERROR_EAGAIN) { + break; + } + else if (rc == 0) { + sshc->authed = TRUE; + infof(conn->data, "Initialized SSH public key authentication\n"); + state(conn, SSH_AUTH_DONE); + } else { + state(conn, SSH_AUTH_PASS_INIT); + } + break; + + case SSH_AUTH_PASS_INIT: + if ((data->set.ssh_auth_types & CURLSSH_AUTH_PASSWORD) && + (strstr(sshc->authlist, "password") != NULL)) { + state(conn, SSH_AUTH_PASS); + } else { + state(conn, SSH_AUTH_HOST_INIT); + } + break; + + case SSH_AUTH_PASS: + rc = libssh2_userauth_password(ssh->ssh_session, ssh->user, + ssh->passwd); + if (rc == LIBSSH2_ERROR_EAGAIN) { + break; + } + else if (rc == 0) { + sshc->authed = TRUE; + infof(conn->data, "Initialized password authentication\n"); + state(conn, SSH_AUTH_DONE); + } else { + state(conn, SSH_AUTH_HOST_INIT); + } + break; + + case SSH_AUTH_HOST_INIT: + if ((data->set.ssh_auth_types & CURLSSH_AUTH_HOST) && + (strstr(sshc->authlist, "hostbased") != NULL)) { + state(conn, SSH_AUTH_HOST); + } + break; + + case SSH_AUTH_HOST: + state(conn, SSH_AUTH_KEY_INIT); + break; + + case SSH_AUTH_KEY_INIT: + if ((data->set.ssh_auth_types & CURLSSH_AUTH_KEYBOARD) + && (strstr(sshc->authlist, "keyboard-interactive") != NULL)) { + state(conn, SSH_AUTH_KEY); + } else { + state(conn, SSH_AUTH_DONE); + } + break; + + case SSH_AUTH_KEY: + /* Authentication failed. Continue with keyboard-interactive now. */ + rc = libssh2_userauth_keyboard_interactive_ex(ssh->ssh_session, + ssh->user, + strlen(ssh->user), + &kbd_callback); + if (rc == LIBSSH2_ERROR_EAGAIN) { + break; + } + else if (rc == 0) { + sshc->authed = TRUE; + infof(conn->data, "Initialized keyboard interactive authentication\n"); + } + state(conn, SSH_AUTH_DONE); + break; + + case SSH_AUTH_DONE: + if (!sshc->authed) { + failf(data, "Authentication failure"); + libssh2_session_free(ssh->ssh_session); + ssh->ssh_session = NULL; + state(conn, SSH_STOP); + result = CURLE_LOGIN_DENIED; + break; + } + + /* + * At this point we have an authenticated ssh session. + */ + infof(conn->data, "Authentication complete\n"); + + conn->sockfd = sock; + conn->writesockfd = CURL_SOCKET_BAD; + + if (conn->protocol == PROT_SFTP) { + state(conn, SSH_SFTP_INIT); + break; + } + state(conn, SSH_GET_WORKINGPATH); + break; + + case SSH_SFTP_INIT: + /* + * Start the libssh2 sftp session + */ + ssh->sftp_session = libssh2_sftp_init(ssh->ssh_session); + if (!ssh->sftp_session) { + if (libssh2_session_last_errno(ssh->ssh_session) == + LIBSSH2_ERROR_EAGAIN) { + break; + } else { + failf(data, "Failure initialising sftp session\n"); + libssh2_session_free(ssh->ssh_session); + ssh->ssh_session = NULL; + state(conn, SSH_STOP); + result = CURLE_FAILED_INIT; + break; + } + } + state(conn, SSH_SFTP_REALPATH); + break; + + case SSH_SFTP_REALPATH: + { + char tempHome[PATH_MAX]; + + /* + * Get the "home" directory + */ + rc = libssh2_sftp_realpath(ssh->sftp_session, ".", + tempHome, PATH_MAX-1); + if (rc == LIBSSH2_ERROR_EAGAIN) { + break; + } + else if (rc > 0) { + /* It seems that this string is not always NULL terminated */ + tempHome[rc] = '\0'; + ssh->homedir = (char *)strdup(tempHome); + if (!ssh->homedir) { + libssh2_sftp_shutdown(ssh->sftp_session); + ssh->sftp_session = NULL; + libssh2_session_free(ssh->ssh_session); + ssh->ssh_session = NULL; + state(conn, SSH_STOP); + result = CURLE_OUT_OF_MEMORY; + break; + } + } else { + /* Return the error type */ + result = libssh2_sftp_last_error(ssh->sftp_session); + DEBUGF(infof(data, "error = %d\n", result)); + state(conn, SSH_STOP); + break; + } + state(conn, SSH_GET_WORKINGPATH); + } + break; + + case SSH_GET_WORKINGPATH: + { + char *real_path; + char *working_path; + int working_path_len; + + working_path = curl_easy_unescape(data, data->reqdata.path, 0, + &working_path_len); + if (!working_path) { + state(conn, SSH_STOP); + result = CURLE_OUT_OF_MEMORY; + break; + } + + /* Check for /~/ , indicating relative to the user's home directory */ + if (conn->protocol == PROT_SCP) { + real_path = (char *)malloc(working_path_len+1); + if (real_path == NULL) { + libssh2_session_free(ssh->ssh_session); + ssh->ssh_session = NULL; + Curl_safefree(working_path); + state(conn, SSH_STOP); + result = CURLE_OUT_OF_MEMORY; + break; + } + if (working_path[1] == '~') + /* It is referenced to the home directory, so strip the + leading '/' */ + memcpy(real_path, working_path+1, 1 + working_path_len-1); + else + memcpy(real_path, working_path, 1 + working_path_len); + } + else if (conn->protocol == PROT_SFTP) { + if (working_path[1] == '~') { + real_path = (char *)malloc(strlen(ssh->homedir) + + working_path_len + 1); + if (real_path == NULL) { + libssh2_sftp_shutdown(ssh->sftp_session); + ssh->sftp_session = NULL; + libssh2_session_free(ssh->ssh_session); + ssh->ssh_session = NULL; + Curl_safefree(ssh->homedir); + ssh->homedir = NULL; + Curl_safefree(working_path); + state(conn, SSH_STOP); + result = CURLE_OUT_OF_MEMORY; + break; + } + /* It is referenced to the home directory, so strip the + leading '/' */ + memcpy(real_path, ssh->homedir, strlen(ssh->homedir)); + real_path[strlen(ssh->homedir)] = '/'; + real_path[strlen(ssh->homedir)+1] = '\0'; + if (working_path_len > 3) { + memcpy(real_path+strlen(ssh->homedir)+1, working_path + 3, + 1 + working_path_len -3); + } + } + else { + real_path = (char *)malloc(working_path_len+1); + if (real_path == NULL) { + libssh2_sftp_shutdown(ssh->sftp_session); + ssh->sftp_session = NULL; + libssh2_session_free(ssh->ssh_session); + ssh->ssh_session = NULL; + Curl_safefree(ssh->homedir); + ssh->homedir = NULL; + Curl_safefree(working_path); + state(conn, SSH_STOP); + result = CURLE_OUT_OF_MEMORY; + break; + } + memcpy(real_path, working_path, 1+working_path_len); + } + } + else { + libssh2_session_free(ssh->ssh_session); + ssh->ssh_session = NULL; + Curl_safefree(working_path); + state(conn, SSH_STOP); + result = CURLE_FAILED_INIT; + break; + } + + Curl_safefree(working_path); + ssh->path = real_path; + + /* Connect is all done */ + state(conn, SSH_STOP); + } + break; + + case SSH_QUIT: + /* fallthrough, just stop! */ + default: + /* internal error */ + state(conn, SSH_STOP); + break; + } + + return result; +} + +/* called repeatedly until done from multi.c */ +CURLcode Curl_ssh_multi_statemach(struct connectdata *conn, + bool *done) +{ + curl_socket_t sock = conn->sock[FIRSTSOCKET]; + int rc = 1; + struct SessionHandle *data=conn->data; + struct ssh_conn *sshc = &conn->proto.sshc; + CURLcode result = CURLE_OK; +#if 0 + long timeout_ms = ssh_state_timeout(conn); +#endif + + *done = FALSE; /* default to not done yet */ + +#if 0 + if (timeout_ms <= 0) { + failf(data, "SSH response timeout"); + return CURLE_OPERATION_TIMEDOUT; + } + + rc = Curl_socket_ready(sshc->sendleft?CURL_SOCKET_BAD:sock, /* reading */ + sshc->sendleft?sock:CURL_SOCKET_BAD, /* writing */ + 0); +#endif + + if (rc == -1) { + failf(data, "select/poll error"); + return CURLE_OUT_OF_MEMORY; + } + else if (rc != 0) { + result = ssh_statemach_act(conn); + *done = (bool)(sshc->state == SSH_STOP); + } + /* if rc == 0, then select() timed out */ + + return result; +} + +static CURLcode ssh_easy_statemach(struct connectdata *conn) +{ + curl_socket_t sock = conn->sock[FIRSTSOCKET]; + int rc = 1; + struct SessionHandle *data=conn->data; + struct ssh_conn *sshc = &conn->proto.sshc; + CURLcode result = CURLE_OK; + + while(sshc->state != SSH_STOP) { +#if 0 + long timeout_ms = ssh_state_timeout(conn); + + if (timeout_ms <=0 ) { + failf(data, "SSH response timeout"); + return CURLE_OPERATION_TIMEDOUT; /* already too little time */ + } + + rc = Curl_socket_ready(sshc->sendleft?CURL_SOCKET_BAD:sock, /* reading */ + sshc->sendleft?sock:CURL_SOCKET_BAD, /* writing */ + (int)timeout_ms); +#endif + + if (rc == -1) { + failf(data, "select/poll error"); + return CURLE_OUT_OF_MEMORY; + } + else if (rc == 0) { + result = CURLE_OPERATION_TIMEDOUT; + break; + } + else { + result = ssh_statemach_act(conn); + if (result) + break; + } + } + +return result; +} + +/* + * SSH setup and connection + */ static CURLcode ssh_init(struct connectdata *conn) { struct SessionHandle *data = conn->data; @@ -289,11 +805,6 @@ CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done) ssh = data->reqdata.proto.ssh; - working_path = curl_easy_unescape(data, data->reqdata.path, 0, - &working_path_len); - if (!working_path) - return CURLE_OUT_OF_MEMORY; - #ifdef CURL_LIBSSH2_DEBUG if (ssh->user) { infof(data, "User: %s\n", ssh->user); @@ -307,15 +818,9 @@ CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done) libssh2_realloc, ssh); if (ssh->ssh_session == NULL) { failf(data, "Failure initialising ssh session"); - Curl_safefree(working_path); return CURLE_FAILED_INIT; } -#if (LIBSSH2_APINO >= 200706012030) - /* Set libssh2 to non-blocking, since cURL is all non-blocking */ - libssh2_session_set_blocking(ssh->ssh_session, 0); -#endif /* LIBSSH2_APINO >= 200706012030 */ - #ifdef CURL_LIBSSH2_DEBUG libssh2_trace(ssh->ssh_session, LIBSSH2_TRACE_CONN|LIBSSH2_TRACE_TRANS| LIBSSH2_TRACE_KEX|LIBSSH2_TRACE_AUTH|LIBSSH2_TRACE_SCP| @@ -325,16 +830,35 @@ CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done) #endif /* CURL_LIBSSH2_DEBUG */ #if (LIBSSH2_APINO >= 200706012030) - while ((i = libssh2_session_startup(ssh->ssh_session, sock)) == - LIBSSH2_ERROR_EAGAIN); + /* Set libssh2 to non-blocking, since cURL is all non-blocking */ + libssh2_session_set_blocking(ssh->ssh_session, 0); + + state(conn, SSH_S_STARTUP); + + if (data->state.used_interface == Curl_if_multi) + result = Curl_ssh_multi_statemach(conn, done); + else { + result = ssh_easy_statemach(conn); + if (!result) + *done = TRUE; + } + + return result; + (void)authed; /* not used */ + (void)working_path; /* not used */ + (void)working_path_len; /* not used */ + (void)real_path; /* not used */ + (void)tempHome; /* not used */ + (void)authlist; /* not used */ + (void)fingerprint; /* not used */ + (void)i; /* not used */ + #else /* !(LIBSSH2_APINO >= 200706012030) */ - i = libssh2_session_startup(ssh->ssh_session, sock); -#endif /* !(LIBSSH2_APINO >= 200706012030) */ - if (i) { + + if (libssh2_session_startup(ssh->ssh_session, sock)) { failf(data, "Failure establishing ssh session"); libssh2_session_free(ssh->ssh_session); ssh->ssh_session = NULL; - Curl_safefree(working_path); return CURLE_FAILED_INIT; } @@ -367,29 +891,13 @@ CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done) * presumably with a blank username. That won't work in my experience. * So always specify it here. */ -#if (LIBSSH2_APINO >= 200706012030) - do { - authlist = libssh2_userauth_list(ssh->ssh_session, ssh->user, - strlen(ssh->user)); - - if (!authlist && (libssh2_session_last_errno(ssh->ssh_session) != - LIBSSH2_ERROR_EAGAIN)) { - libssh2_session_free(ssh->ssh_session); - ssh->ssh_session = NULL; - Curl_safefree(working_path); - return CURLE_OUT_OF_MEMORY; - } - } while (!authlist); -#else /* !(LIBSSH2_APINO >= 200706012030) */ authlist = libssh2_userauth_list(ssh->ssh_session, ssh->user, strlen(ssh->user)); if (!authlist) { libssh2_session_free(ssh->ssh_session); ssh->ssh_session = NULL; - Curl_safefree(working_path); return CURLE_OUT_OF_MEMORY; } -#endif /* !(LIBSSH2_APINO >= 200706012030) */ infof(data, "SSH authentication methods available: %s\n", authlist); /* @@ -431,16 +939,8 @@ CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done) if (rsa_pub[0]) { /* The function below checks if the files exists, no need to stat() here. */ -#if (LIBSSH2_APINO >= 200706012030) - while ((i = libssh2_userauth_publickey_fromfile(ssh->ssh_session, - ssh->user, rsa_pub, - rsa, passphrase)) == - LIBSSH2_ERROR_EAGAIN); -#else /* !(LIBSSH2_APINO >= 200706012030) */ - i = libssh2_userauth_publickey_fromfile(ssh->ssh_session, ssh->user, - rsa_pub, rsa, passphrase); -#endif /* !(LIBSSH2_APINO >= 200706012030) */ - if (i == 0) { + if (libssh2_userauth_publickey_fromfile(ssh->ssh_session, ssh->user, + rsa_pub, rsa, passphrase) == 0) { authed = TRUE; infof(conn->data, "Initialized SSH public key authentication\n"); } @@ -449,14 +949,7 @@ CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done) if (!authed && (data->set.ssh_auth_types & CURLSSH_AUTH_PASSWORD) && (strstr(authlist, "password") != NULL)) { -#if (LIBSSH2_APINO >= 200706012030) - while ((i = libssh2_userauth_password(ssh->ssh_session, ssh->user, - ssh->passwd)) == - LIBSSH2_ERROR_EAGAIN); -#else /* !(LIBSSH2_APINO >= 200706012030) */ - i = libssh2_userauth_password(ssh->ssh_session, ssh->user, ssh->passwd); -#endif /* !(LIBSSH2_APINO >= 200706012030) */ - if (i == 0) { + if (!libssh2_userauth_password(ssh->ssh_session, ssh->user, ssh->passwd)) { authed = TRUE; infof(conn->data, "Initialized password authentication\n"); } @@ -467,18 +960,9 @@ CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done) if (!authed && (data->set.ssh_auth_types & CURLSSH_AUTH_KEYBOARD) && (strstr(authlist, "keyboard-interactive") != NULL)) { /* Authentication failed. Continue with keyboard-interactive now. */ -#if (LIBSSH2_APINO >= 200706012030) - while ((i = libssh2_userauth_keyboard_interactive_ex(ssh->ssh_session, - ssh->user, - strlen(ssh->user), - &kbd_callback)) == - LIBSSH2_ERROR_EAGAIN); -#else /* !(LIBSSH2_APINO >= 200706012030) */ - i = libssh2_userauth_keyboard_interactive_ex(ssh->ssh_session, ssh->user, - strlen(ssh->user), - &kbd_callback); -#endif /* !(LIBSSH2_APINO >= 200706012030) */ - if (i == 0) { + if (!libssh2_userauth_keyboard_interactive_ex(ssh->ssh_session, ssh->user, + strlen(ssh->user), + &kbd_callback)) { authed = TRUE; infof(conn->data, "Initialized keyboard interactive authentication\n"); } @@ -490,7 +974,6 @@ CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done) failf(data, "Authentication failure"); libssh2_session_free(ssh->ssh_session); ssh->ssh_session = NULL; - Curl_safefree(working_path); return CURLE_LOGIN_DENIED; } @@ -506,40 +989,19 @@ CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done) /* * Start the libssh2 sftp session */ -#if (LIBSSH2_APINO >= 200706012030) - do { - ssh->sftp_session = libssh2_sftp_init(ssh->ssh_session); - if (!ssh->sftp_session && (libssh2_session_last_errno(ssh->ssh_session) != - LIBSSH2_ERROR_EAGAIN)) { - failf(data, "Failure initialising sftp session\n"); - libssh2_session_free(ssh->ssh_session); - ssh->ssh_session = NULL; - Curl_safefree(working_path); - return CURLE_FAILED_INIT; - } - } while (!ssh->sftp_session); -#else /* !(LIBSSH2_APINO >= 200706012030) */ ssh->sftp_session = libssh2_sftp_init(ssh->ssh_session); if (ssh->sftp_session == NULL) { failf(data, "Failure initialising sftp session\n"); libssh2_session_free(ssh->ssh_session); ssh->ssh_session = NULL; - Curl_safefree(working_path); return CURLE_FAILED_INIT; } -#endif /* !(LIBSSH2_APINO >= 200706012030) */ /* * Get the "home" directory */ -#if (LIBSSH2_APINO >= 200706012030) - while ((i = libssh2_sftp_realpath(ssh->sftp_session, ".", - tempHome, PATH_MAX-1)) == - LIBSSH2_ERROR_EAGAIN); -#else /* !(LIBSSH2_APINO >= 200706012030) */ - i = libssh2_sftp_realpath(ssh->sftp_session, ".", tempHome, PATH_MAX-1); -#endif /* !(LIBSSH2_APINO >= 200706012030) */ - if (i > 0) { + if (libssh2_sftp_realpath(ssh->sftp_session, ".", tempHome, PATH_MAX-1) + > 0) { /* It seems that this string is not always NULL terminated */ tempHome[i] = '\0'; ssh->homedir = (char *)strdup(tempHome); @@ -548,7 +1010,6 @@ CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done) ssh->sftp_session = NULL; libssh2_session_free(ssh->ssh_session); ssh->ssh_session = NULL; - Curl_safefree(working_path); return CURLE_OUT_OF_MEMORY; } } @@ -559,6 +1020,11 @@ CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done) } } + working_path = curl_easy_unescape(data, data->reqdata.path, 0, + &working_path_len); + if (!working_path) + return CURLE_OUT_OF_MEMORY; + /* Check for /~/ , indicating relative to the user's home directory */ if (conn->protocol == PROT_SCP) { real_path = (char *)malloc(working_path_len+1); @@ -624,6 +1090,7 @@ CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done) *done = TRUE; return CURLE_OK; +#endif /* !(LIBSSH2_APINO >= 200706012030) */ } CURLcode Curl_scp_do(struct connectdata *conn, bool *done) @@ -27,6 +27,7 @@ #ifdef USE_LIBSSH2 CURLcode Curl_ssh_connect(struct connectdata *conn, bool *done); +CURLcode Curl_ssh_multi_statemach(struct connectdata *conn, bool *done); CURLcode Curl_scp_do(struct connectdata *conn, bool *done); CURLcode Curl_scp_done(struct connectdata *conn, CURLcode, bool premature); diff --git a/lib/urldata.h b/lib/urldata.h index 023bc3ca3..83053fbcf 100644 --- a/lib/urldata.h +++ b/lib/urldata.h @@ -406,6 +406,29 @@ struct ftp_conn { ftpstate state; /* always use ftp.c:state() to change state! */ }; +/**************************************************************************** + * SSH unique setup + ***************************************************************************/ +typedef enum { + SSH_STOP, /* do nothing state, stops the state machine */ + SSH_S_STARTUP, /* Session startup */ + SSH_AUTHLIST, + SSH_AUTH_PKEY_INIT, + SSH_AUTH_PKEY, + SSH_AUTH_PASS_INIT, + SSH_AUTH_PASS, + SSH_AUTH_HOST_INIT, + SSH_AUTH_HOST, + SSH_AUTH_KEY_INIT, + SSH_AUTH_KEY, + SSH_AUTH_DONE, + SSH_SFTP_INIT, + SSH_SFTP_REALPATH, + SSH_GET_WORKINGPATH, + SSH_QUIT, + SSH_LAST /* never used */ +} sshstate; + struct SSHPROTO { curl_off_t *bytecountp; char *user; @@ -421,6 +444,17 @@ struct SSHPROTO { #endif /* USE_LIBSSH2 */ }; +/* ssh_conn is used for struct connection-oriented data in the connectdata + struct */ +struct ssh_conn { + const char *authlist; /* List of auth. methods, managed by libssh2 */ + const char *passphrase; + char rsa_pub[PATH_MAX]; + char rsa[PATH_MAX]; + bool authed; + sshstate state; /* always use ssh.c:state() to change state! */ +}; + /**************************************************************************** * FILE unique setup @@ -900,6 +934,7 @@ struct connectdata { union { struct ftp_conn ftpc; + struct ssh_conn sshc; } proto; int cselect_bits; /* bitmask of socket events */ |